comparemela.com

Joyce v. Hail. The wallic family in memory of mere ram and ira dean wallic. Bernard and irene schwartz. Roslyn p. Walter. Corporate funding is provided by mutual of america. Designing customized, individual and Group Retirement products. Thats why were your retirement company. Additional support is provided by the corporation for public broadcasting. And by contributions to your pbs station from vars like you. Thank you. From the tish wnet studios at Lincoln Center in new york. Good evening. Thanks for joining us. During his weekly radio address today president obama accused Congressional Republicans of root formal the Affordable Care act to fail. He also tried to reassure the public that the healthcare. Gov website will be fixed soon. Weve got people working overtime 24 7 to boost capacity and address these problems every single day. But even as we improve the web site, remember that the website isnt the only way to apply for coverage under these new plans. Weve updated healthcare. Gov to offer more information about enrolling over the phone, by mail or in person with a specially trained navigator who can help answer your questions. In the republican response, congressman fred upton said the website glitches could be the beginning of even greater problems. This is more than a website problem. Were also concerned about what happens next . Will enrollment glitches become provider payment glitches . Will patients show up at the Doctors Office or hospital only to be told that they are not in the system . And is the personal information that americans provide as part of the enrollment process really safe from cyber hackers and Identity Theft . Theres been an outburst of violence along the border between iran and pakistan. Media reports 14 Iranian Border guards were killed, 6 wounded, 3 captured during an overnight attack by people they described as bandits. Iran responded quickly by hanging 16 prisoners it described as terrorists. Iranian Security Forces have battled drug traffickers in the area but there has also been a great deal of unrest in the border region between pack stamp sunni and iran shia muslim populations. A suicide bombing there three years ago killed dozens of people. A u. N. Envoy said today iran should have a place at any peace talks aimed at ending the civil war in syria. The United Nations is hoping the peace Conference Takes Place in geneva late next month but Syrian Opposition leaders have not yet agreet to attend. A prior to Charitable Fund designed to cover Mental Health care of survivors at the Newton School massacre is running out of money. One officer is still too traumatized to return to work and could be fired. The end of a longstanding business relationship between two very famous brand names. Mcdonalds has reportedly decided to stop using heinz ketchup after heinz hired the former ceo of burger king. He still serves as the vice chairman of burger kings board. From peru, word of a remarkable archeological discovery. Two wellpreserved mummies, one adult and one child, squatting and wrapped in rope, unearthed during a dig outside the capital city of lima. The remains are thought to be more than 1,000 years old. Researchers believe the adult died first, then the child was possibly buried alive as an offering to the gods. Researchers also discovered other offerings, including the remains of guinea pigs and jars with designs of cats. The discoveries were made at an ancient religious complex being excavated for more than 30 years now. 70 tombs have been uncovered there. We want to take a closer look at a story that broke a couple of days ago, the capture of two americans off the coast of nigeria by armed pirates. The incident occurred in the gulf of guinea. Global business implications because nigeria is africas leading oil producer and a major supplier of cocoa and metals. Were joined by the founder and head of sea level maritime risk. Theres a lot in the air about somalia and piracy partly because of the movie captain phillips and somalias on the east side of africa. What are the parallels and the dissimilarities when it comes to whats happening off the coast of nigeria . Thank you for having me, first of all. Apples and oranges. I think what were looking at the somali case, piracy, its much more maritime based, it originated on the water, and takes advantage of ships, cargos going past somalia. Whereas in tears of nigeria, were looking at a form of criminality which has extended to the water but which is basically land based, based on the illegal black market for oil and attacks ships that actually operate around nigeria, go into and operate close to shore. So its very different models. Nigerias Oil Production has made it a haven for a huge fight. Theres a Political Movement there to try to get people out. There is a possibility these two are interconnected, the crime thats happening offshore, whats happening with oil on land . Yeah, quite so. The group that were looking at right now is possibly connected to the kidnapping, called the m. E. N. D. , movement for the emancipation of the niger delta. It agreed to a truce a few years ago, the militants had put down their guns and gotten benefits as well as education. But it seems to come back up again. Its basically organizing people from the niger delta who are upset at the amount of oil thats pumped out of their part of the country and how little money they have from the National Government to show for it. So is this lucrative enough . Is that why this keeps happening . In terms of the kidnapping, yes, definitely. And also whats called bunkering which is the stealing of oil or gasoline products from pipelines. We have criminal groups that are operating loosely with political as well as other agendas. And theyve been selffinancing, doing this sort of kidnapping mulls stealing of Petroleum Products and reselling them back into the market for years now. And what are some of the safety issues or tactical issues from the u. S. Perfespective to y to get these hostages out . There are many things that could go wrong. We were worried about identifying the group to find out if theyre disciplined. There could be rivalries and fights among the gang members. There could be other gangs that would want to kidnap these two americans because they have high resale value. We could look at a problem this terms of a botched military response if the nigerian or any other government were to move in too quickly. Its very possible that people could get killed in the operation. And kidnappers in that part of the world have been known to kill their hostages when they feel theyre going to lose them. We couldnt do this without nigerias governmental support. Definitely now that its on the ground operation. This is not a captain Philips Rescue operation hundreds of miles out in international waters. Were talking about two american hot are now on nigerian soil. All right, michael froto from washington, thanks so much. Thank you. Now to our signature segment. Original reporting from around the nation and the world. Tonight the war against malicious computer hackers. By one estimate, governments and businesses around the world now spend 46 billion a year trying to protect their computer systems. Some Security Experts now believe the best way is to use the very same techniques the bad guys use. And theyre enlisting a talented group of students at Carnegie Mellon university to help in the fight. Newshour correspondent rick carr reports from pittsburgh. Reporter the bad guys stole more than 3 million Social Security numbers from the state of south carolina. As many as 70 million credit card numbers from sony playstation. They got access to all of the personal details of some customers of a nationwide mortgage lending firm. But cyber criminals arent just looking to steal personal information and credit card numbers when they break massachusetts corporate computers. Theyre looking for other valuable information. Everything about your business is accessible to an attacker. Reporter Stewart Baker is former general counsel of the nsa, now a Computer Security consultant. They can steal your designs. They can steal your knowhow. They can steal your customer list. And your internal analysis of what the biggest problems are in your product. This is pretty scary. Reporter the bad guys are mostly working from china and former soviet states. Theyre welltrained. Some of them are protected by or even working for their governments. So they dont care about getting caught. And they might be able to do even more than steal information from businesses. Security experts worry they could cripple the Banking System or shut down parts of the electric grid. Baker says american businesses need a new mindset if theyre going to defend themselves. Im a big believer that the best defense is an offense. And if were going to have an offense, weve got to have people who are really talented drawn to that field. Reporter people like these undergraduates who just might be able to save americas corporations and governments from the bad guy hackers. Theyre students at Carnegie Mellon university, one of the nations top Computer Science schools, and theyre learning to fight off the bad guys by thinking the same way they do. Theyre learning to be the good guy hackers. You have to understand and be able to anticipate how hackers are going to come at you. If youre only doing defense, if you dont look at offense offense, youre always reactioning and youre always one step behind. Is that different, a change in the way Computer Science faculties have approached this . Traditionally, yeah, there hasnt been a lot of expertise in offensive security and hasnt been taught at the university level. Reporter Computer Security professor David Brumley says its tough to teach because the brandnew, cuttingedge cyber attack of today will be available to anyone with a web browser by next week. For example, my courses in Computer Security, we dont have textbooks. Everythings so new we have to look at websites, we have to look at the latest from conferences, and really teach from that. Every year its a significant update. Is it ever the case that you actually have a student discover something that nobody knew about in the middle of the semester . Oh, thats actually a course requirement. One of the things we ask students to do is go out and find a vulnerability that no one else has found, figure out if its exploitable, and then report it ethically. Which means what . Theyre going and finding something they could use to break into someones computer and then they go tell the programmer, look, here is a flaw, fix it. Reporter all those flaws that Carnegie Mellons undergraduates find dont necessarily mean the software on your ppc or behind your banks website is badly written. Almost every piece of software has vulnerabilities that can be exploited from outside. And when a machines connected to the internet its almost impossible to make it perfectly secure. Whats more, compared to 10 or 20 years ago, there are just so many more computers and tablets and smartphones, all of them connected, all of them vulnerable. Which means were vulnerable too. Carnegie mellons students are so good at exploiting those eventuvulnerabilities the nsa h them to create a game teaching hacking skills to high school students. Cylab, Cyber Security institute, is home to the topranked competitive hacking team in the world, the plaid parliament of poning. Pone is hacker speak for own, as in the hacker takes over the computer and owns it. For the Third Straight year the team won top honors at international cop tests that pit teams of hackers against one another and utterly demolished the competition at a prestigious contest in las vegas. A little bit like a mini cyber war thats going on. You get points by how well you find exploits in your adversaries and how well you can defend against their attack. Theyre secure from the normal internet and set out specifically for this purpose. How stiff is the competition . Whos on your heels in terms of the top ten rankings . Whos not . Theres all sorts of Government Contractors who have teams that we compete with. And they do this professionally. Reporter hacker is a label the students embrace. The word has a long history in Computer Science circles where it was originally meant as praise. The students say it still can be. We dont think of it as a bad thing, we think of it as getting a deeper understanding for how something works. In order to make it do something that maybe it wasnt intended to do, but its capable of doing. Its often the people who, as Young High School students, they started fo ed goofing around wi electronics and computers, how to do simple attacks, how to get inside a machine. Reporter andrew conti is an Investigative Reporter whos written dozens of articles about hackers and Cyber Security. At some point they make the decision, am i going to be a good hacker or a bad hacker . Theres not that much difference between them in terms of their abilities. Huge difference in terms of motivations. Reporter that raises the question of how wise it is to teach these abilities to students barely out of their teens with unknown motivations. Cylab graduate student Peter Chapman says not to worry. If youre figuring out how to attack things, isnt it possible that somebody who comes out of here isnt going to do it for the right reasons . That persons motivated, they can certainly find it out on their own. This isnt hidden information. Someone determined to break into a system, they can take normal courses and add this how am i going to ruin the world mindset to it. Its the same way a locksmith who knows how to fix locks can also break into them. Reporter Cyber Security consultant Stewart Baker says sometimes it makes sense for a company thats been the target of bad guy hackers to engage in the little digital breaking and entering of its own, to hack back, in other words. He thinks it could important weapon in the Cyber Security arsenal. But it isnt so clearcut ethically or legally, because it can violate federal Computer Security laws. I have been making a very public argument that we should allow this. And we should read the Computer Fraud and abuse act to permit it. What if the machine question is outside the u. S. . Is it still a violation of the act . Unfortunately, it is. Reporter baker says good guy hackers who have hacked back have learned that cyber criminals arent always as clever as they seem to be. Take the example of a hacker who broke into Law Enforcement computers, copied personal information about officers, and posted it online. He also left a provocative picture of his girlfriend as a calling card. Which turned out to be a mistake. They took the picture with an iphone. And that meant that somebody had helpfully included the geographic coordinates where the picture was taken. So the fbi finds the girlfriend of the hacker and went and busted the guy in texas. So these digital clues are everywhere. Reporter the hacker pleaded guilty to accessing a protected computer without authorization and received a sentence of 27 months in prison. Stewart baker says thats the kind of outcome hed like to see from good guy hackers like the students at Carnegie Mellon. Hear more from the student hackers to make up the plaid partner at of poning. Newshour. Pbs. Org. There were acts of defiance against authorities in saudi arabia today. Women pushed back against a longstanding ban on driving. And then posted videos of it online. Its the latest challenge to religious leaders by women seeking greater freedoms at home. And at work. Seeking new ways to express themselves. Theres currently a movie in u. S. Theet theres shows how times are changing in saudi arabia. This is the first feature film made in saudi arabia and the first directed by a woman. The movie is about a young teen who wants nothing more than to ride a bike. But isnt allowed to because of religious norms. Though its fiction, the film also shows the secondclass status of saudi women in real life. The need for approval from their husbands or male guardians before working. And a mans right to more than one wife. And then theres the ban on women driving. Just as the movie rebels against tra digs limiting what the main character can do, saudi women are challenging the old ways. Dr. Madea who studied in the United States for several years spoke to newshour via skype. She recently posted her own driving video and shes been fighting for the right to drive for more than 20 years. I actually drove three times. First time is 1990. And the second time is 2011. The first two times i got losing my job. In the First Campaign in the 1990s, 47 womens were arrested, denounced in hundreds of mosques, labeled women out to destroy saudi society. 1990, i was very scared. We had to drive within a group. We didnt know it was going to happen to us. Felt much more vulnerable, 1990. 2013, yeah, a little fear. But i know that the support system is really very large. Saudi arabia has to change. And i dont think its a matter of choice. It isnt. We are part of this global world. Were part of this global economy. And we no longer could keep our 50 of society handicapped. This video shot by another woman says the Current Campaign is not just a fight for equal rights. The right to drive, she says, is a matter of practicality. Youre completely depend dent 24 7. If an emergency happens in the house, you cant pick up and leave. If my husbands not available, hes got his own stuff to do, then i cant go to work. I cant take my daughter to the hospital. I cant go for an emergency. Im completely stuck. Theres been a backlash. One cleric argued on Saudi Television last month that driving actually poses health risks to women. As the movement was gaining momentum, the driving campaigns website was blocked. Many suspected that it was the work of a special religious police force that tries to enforce the countrys conservative customs. All this has sparked headlines around the world. An online petition calling for a repeal of the driving ban has been signed by more than 16,000 people. And the cause is gaining support in the streets of riyadh. This video shot by another saudi woman captures men giving women drive areas thumbsup. Others like Aziza Al Youssef have gotten involved in the driving campaign more recently and say thats putting more pressure on saudi leaders to change. I think this time people there is more acceptance from the society. And i think there is more people in this campaign than ever. And i think its going to happen very soon. But al youssef isnt waiting for permission. Its not like its a oneday thing. For me in my mind there is no ban. I do it two or three times a week. Madea says shes not stopping any time soon. Nothing is given to you. You really have to find it. And we know in United States, we know in europe, women had to really struggle, women had to be imprisoned. No reason i think it should be any easier in saudi arabia. It isnt. Its just a matter of being resistant and just continuing one after the other. One request after the other. Right now our main request is driving. This is pbs newshour weekend saturday. Finally, a disturbing account about conditions in north koreas prison system. This from an escapee who jumped off a train, swam across a river to china, and would eventually make his way to england. He spoke at a United Nations Human Rights Committee hearing. Itns Foreign Affairs correspondent Jonathan Rugman reports. Reporter he wasnt always from surrey. Before he tasted cappuccinos, he survived on cups of gruel. Kim is an escaped prisoner from north korea, the worlds most repressive state. Mr. Kim said he had been held in a single prison cell with 40 people who had no room to stand or move. The door of that cell was 50 centimeters high. The north korean Prison Guards were telling us that, once you get to this prison, its because youre not human. Youre just like animals. And as soon as you get to this prison, you have to crawl just like animals. Reporter he showed the u. N. Panel how he hid money from his Prison Guards by swallowing it. And though he eventually jumped from a moving prison train, his mother died, handcuffed to her bed. The Australian High Court judge heading this inquiry says hes interviewing 150 witnesses and unearthing appalling evidence. Evidence of bodies in large cartloads being taken away to be burned in a pot. And other evidence of humiliating circumstances. Sadly, theres a lot of evidence. Theres no end to the testimony that can be secured. Reporter his inquiry is visiting five countries in the search for that testimony and hoping to shine a spotlight on the regimes human rights abuses like never before. Join us tomorrow onair and online. Risk and reward. The new government rules that will allow more persons to invest in startup businesses. I think its going to leash another wave of entrepreneurship all across the nation. Thats it for this edition of newshour weekend. Thanks for watching. Pbs newshour weekend is made possible by lewis b. And Louise Hirschfeld komen. Judy and josh westin. The wallic family in memory of miriam and ira dean wallic. The cheryl and philip willstein family. Bernard and irene schwartz. Roslyn p. Walter. Corporate funding is provided by mutual of america. Designing customized, individual and Group Retirement products. Were your retirement company. Additional support is provided by the corporation for public broadcasting. And by contributions to your pbs station from viewers like you. Thank you. Narrator why would a goat never leave a horses side. For 16 years . What would possess a big lion to bond with a little coyote . Man Mother Nature is teaching me something every time i see a relationship like this. Narrator scenes like these are overturning the conventional wisdom that only humans forge friendships. Theres a lot of people that dont want to admit that animals have emotions. Narrator is it compassion or companionship that bonds two animals of different species together . Woman when they greet each other, ive never seen anything like it. Its not a deer greeting a deer, its not a dog greeting a dog. Its definitely something that they have between the two of them. Narrator whatever the case, something deep is being expressed when animals make unexpected friends

© 2025 Vimarsana

comparemela.com © 2020. All Rights Reserved.